Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.972445] ================================================================== [ 21.973294] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.973491] Write of size 121 at addr fff00000c76c3a00 by task kunit_try_catch/286 [ 21.973886] [ 21.973967] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.974082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.974116] Hardware name: linux,dummy-virt (DT) [ 21.974166] Call trace: [ 21.974196] show_stack+0x20/0x38 (C) [ 21.974261] dump_stack_lvl+0x8c/0xd0 [ 21.974321] print_report+0x118/0x608 [ 21.974374] kasan_report+0xdc/0x128 [ 21.974425] kasan_check_range+0x100/0x1a8 [ 21.974481] __kasan_check_write+0x20/0x30 [ 21.974532] copy_user_test_oob+0x234/0xec8 [ 21.974583] kunit_try_run_case+0x170/0x3f0 [ 21.974640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.974699] kthread+0x328/0x630 [ 21.974749] ret_from_fork+0x10/0x20 [ 21.974806] [ 21.974829] Allocated by task 286: [ 21.974866] kasan_save_stack+0x3c/0x68 [ 21.975017] kasan_save_track+0x20/0x40 [ 21.975097] kasan_save_alloc_info+0x40/0x58 [ 21.976122] __kasan_kmalloc+0xd4/0xd8 [ 21.976594] __kmalloc_noprof+0x198/0x4c8 [ 21.976972] kunit_kmalloc_array+0x34/0x88 [ 21.977089] copy_user_test_oob+0xac/0xec8 [ 21.977292] kunit_try_run_case+0x170/0x3f0 [ 21.977396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.977874] kthread+0x328/0x630 [ 21.978091] ret_from_fork+0x10/0x20 [ 21.978217] [ 21.978299] The buggy address belongs to the object at fff00000c76c3a00 [ 21.978299] which belongs to the cache kmalloc-128 of size 128 [ 21.979047] The buggy address is located 0 bytes inside of [ 21.979047] allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78) [ 21.979219] [ 21.979478] The buggy address belongs to the physical page: [ 21.979528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3 [ 21.979603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.979667] page_type: f5(slab) [ 21.979871] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.980321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.980453] page dumped because: kasan: bad access detected [ 21.980628] [ 21.980706] Memory state around the buggy address: [ 21.981146] fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.981555] fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.982142] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.982290] ^ [ 21.982572] fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.982818] fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.982926] ================================================================== [ 22.061149] ================================================================== [ 22.061408] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 22.061830] Read of size 121 at addr fff00000c76c3a00 by task kunit_try_catch/286 [ 22.062052] [ 22.062170] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.062274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.062304] Hardware name: linux,dummy-virt (DT) [ 22.062588] Call trace: [ 22.062775] show_stack+0x20/0x38 (C) [ 22.062854] dump_stack_lvl+0x8c/0xd0 [ 22.063103] print_report+0x118/0x608 [ 22.063421] kasan_report+0xdc/0x128 [ 22.063687] kasan_check_range+0x100/0x1a8 [ 22.063920] __kasan_check_read+0x20/0x30 [ 22.064107] copy_user_test_oob+0x4a0/0xec8 [ 22.064271] kunit_try_run_case+0x170/0x3f0 [ 22.064342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.064404] kthread+0x328/0x630 [ 22.064459] ret_from_fork+0x10/0x20 [ 22.064519] [ 22.064542] Allocated by task 286: [ 22.064578] kasan_save_stack+0x3c/0x68 [ 22.064842] kasan_save_track+0x20/0x40 [ 22.065268] kasan_save_alloc_info+0x40/0x58 [ 22.065580] __kasan_kmalloc+0xd4/0xd8 [ 22.065752] __kmalloc_noprof+0x198/0x4c8 [ 22.065937] kunit_kmalloc_array+0x34/0x88 [ 22.065996] copy_user_test_oob+0xac/0xec8 [ 22.066046] kunit_try_run_case+0x170/0x3f0 [ 22.066090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.066218] kthread+0x328/0x630 [ 22.066270] ret_from_fork+0x10/0x20 [ 22.066315] [ 22.066351] The buggy address belongs to the object at fff00000c76c3a00 [ 22.066351] which belongs to the cache kmalloc-128 of size 128 [ 22.066444] The buggy address is located 0 bytes inside of [ 22.066444] allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78) [ 22.066518] [ 22.066558] The buggy address belongs to the physical page: [ 22.066608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3 [ 22.066671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.066747] page_type: f5(slab) [ 22.066805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.066866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.066927] page dumped because: kasan: bad access detected [ 22.066965] [ 22.066997] Memory state around the buggy address: [ 22.067038] fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.067315] fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.067398] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.067928] ^ [ 22.068362] fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.068428] fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.068659] ================================================================== [ 22.049300] ================================================================== [ 22.049388] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 22.049462] Write of size 121 at addr fff00000c76c3a00 by task kunit_try_catch/286 [ 22.049525] [ 22.049571] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.049662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.049694] Hardware name: linux,dummy-virt (DT) [ 22.049968] Call trace: [ 22.050013] show_stack+0x20/0x38 (C) [ 22.050077] dump_stack_lvl+0x8c/0xd0 [ 22.050149] print_report+0x118/0x608 [ 22.050204] kasan_report+0xdc/0x128 [ 22.050252] kasan_check_range+0x100/0x1a8 [ 22.050306] __kasan_check_write+0x20/0x30 [ 22.050354] copy_user_test_oob+0x434/0xec8 [ 22.050408] kunit_try_run_case+0x170/0x3f0 [ 22.050461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.050520] kthread+0x328/0x630 [ 22.050586] ret_from_fork+0x10/0x20 [ 22.050644] [ 22.050666] Allocated by task 286: [ 22.050702] kasan_save_stack+0x3c/0x68 [ 22.050750] kasan_save_track+0x20/0x40 [ 22.050794] kasan_save_alloc_info+0x40/0x58 [ 22.050839] __kasan_kmalloc+0xd4/0xd8 [ 22.050891] __kmalloc_noprof+0x198/0x4c8 [ 22.050934] kunit_kmalloc_array+0x34/0x88 [ 22.050985] copy_user_test_oob+0xac/0xec8 [ 22.051026] kunit_try_run_case+0x170/0x3f0 [ 22.051070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.052155] kthread+0x328/0x630 [ 22.052205] ret_from_fork+0x10/0x20 [ 22.052261] [ 22.052287] The buggy address belongs to the object at fff00000c76c3a00 [ 22.052287] which belongs to the cache kmalloc-128 of size 128 [ 22.053043] The buggy address is located 0 bytes inside of [ 22.053043] allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78) [ 22.053337] [ 22.053489] The buggy address belongs to the physical page: [ 22.053543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3 [ 22.053719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.053784] page_type: f5(slab) [ 22.054433] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.054518] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.055059] page dumped because: kasan: bad access detected [ 22.055428] [ 22.055798] Memory state around the buggy address: [ 22.055856] fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.055912] fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.056418] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.056559] ^ [ 22.056812] fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.057026] fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.057461] ================================================================== [ 22.036600] ================================================================== [ 22.036682] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 22.037149] Read of size 121 at addr fff00000c76c3a00 by task kunit_try_catch/286 [ 22.037234] [ 22.037278] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.037386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.037419] Hardware name: linux,dummy-virt (DT) [ 22.037456] Call trace: [ 22.037482] show_stack+0x20/0x38 (C) [ 22.037541] dump_stack_lvl+0x8c/0xd0 [ 22.037636] print_report+0x118/0x608 [ 22.037692] kasan_report+0xdc/0x128 [ 22.037743] kasan_check_range+0x100/0x1a8 [ 22.037795] __kasan_check_read+0x20/0x30 [ 22.037845] copy_user_test_oob+0x3c8/0xec8 [ 22.037897] kunit_try_run_case+0x170/0x3f0 [ 22.037950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.038027] kthread+0x328/0x630 [ 22.038074] ret_from_fork+0x10/0x20 [ 22.038127] [ 22.039481] Allocated by task 286: [ 22.039786] kasan_save_stack+0x3c/0x68 [ 22.040027] kasan_save_track+0x20/0x40 [ 22.040083] kasan_save_alloc_info+0x40/0x58 [ 22.040334] __kasan_kmalloc+0xd4/0xd8 [ 22.040744] __kmalloc_noprof+0x198/0x4c8 [ 22.040862] kunit_kmalloc_array+0x34/0x88 [ 22.041188] copy_user_test_oob+0xac/0xec8 [ 22.041371] kunit_try_run_case+0x170/0x3f0 [ 22.041482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.041541] kthread+0x328/0x630 [ 22.041767] ret_from_fork+0x10/0x20 [ 22.041923] [ 22.042374] The buggy address belongs to the object at fff00000c76c3a00 [ 22.042374] which belongs to the cache kmalloc-128 of size 128 [ 22.042591] The buggy address is located 0 bytes inside of [ 22.042591] allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78) [ 22.042906] [ 22.042940] The buggy address belongs to the physical page: [ 22.043273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3 [ 22.043901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.044084] page_type: f5(slab) [ 22.044220] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.044477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.044533] page dumped because: kasan: bad access detected [ 22.044644] [ 22.044941] Memory state around the buggy address: [ 22.045001] fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.045534] fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.045872] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.046197] ^ [ 22.046467] fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.046875] fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.046937] ================================================================== [ 22.023788] ================================================================== [ 22.023903] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 22.023983] Write of size 121 at addr fff00000c76c3a00 by task kunit_try_catch/286 [ 22.024206] [ 22.024293] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.024701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.024750] Hardware name: linux,dummy-virt (DT) [ 22.024978] Call trace: [ 22.025015] show_stack+0x20/0x38 (C) [ 22.025098] dump_stack_lvl+0x8c/0xd0 [ 22.025394] print_report+0x118/0x608 [ 22.025470] kasan_report+0xdc/0x128 [ 22.025596] kasan_check_range+0x100/0x1a8 [ 22.025713] __kasan_check_write+0x20/0x30 [ 22.025937] copy_user_test_oob+0x35c/0xec8 [ 22.026081] kunit_try_run_case+0x170/0x3f0 [ 22.026361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.026789] kthread+0x328/0x630 [ 22.026922] ret_from_fork+0x10/0x20 [ 22.027048] [ 22.027383] Allocated by task 286: [ 22.027494] kasan_save_stack+0x3c/0x68 [ 22.027744] kasan_save_track+0x20/0x40 [ 22.027948] kasan_save_alloc_info+0x40/0x58 [ 22.028015] __kasan_kmalloc+0xd4/0xd8 [ 22.028058] __kmalloc_noprof+0x198/0x4c8 [ 22.028504] kunit_kmalloc_array+0x34/0x88 [ 22.028764] copy_user_test_oob+0xac/0xec8 [ 22.029080] kunit_try_run_case+0x170/0x3f0 [ 22.029225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.029454] kthread+0x328/0x630 [ 22.029602] ret_from_fork+0x10/0x20 [ 22.030428] [ 22.030484] The buggy address belongs to the object at fff00000c76c3a00 [ 22.030484] which belongs to the cache kmalloc-128 of size 128 [ 22.030583] The buggy address is located 0 bytes inside of [ 22.030583] allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78) [ 22.030694] [ 22.030938] The buggy address belongs to the physical page: [ 22.031235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3 [ 22.031353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.031420] page_type: f5(slab) [ 22.031471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.031530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.032271] page dumped because: kasan: bad access detected [ 22.032345] [ 22.032593] Memory state around the buggy address: [ 22.032643] fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.032905] fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.033331] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.033621] ^ [ 22.033942] fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.034013] fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.034198] ================================================================== [ 21.993314] ================================================================== [ 21.994919] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.995051] Read of size 121 at addr fff00000c76c3a00 by task kunit_try_catch/286 [ 21.995313] [ 21.995515] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.995728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.996095] Hardware name: linux,dummy-virt (DT) [ 21.996335] Call trace: [ 21.996586] show_stack+0x20/0x38 (C) [ 21.996800] dump_stack_lvl+0x8c/0xd0 [ 21.996954] print_report+0x118/0x608 [ 21.997093] kasan_report+0xdc/0x128 [ 21.997213] kasan_check_range+0x100/0x1a8 [ 21.997767] __kasan_check_read+0x20/0x30 [ 21.997852] copy_user_test_oob+0x728/0xec8 [ 21.998223] kunit_try_run_case+0x170/0x3f0 [ 21.998537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.998816] kthread+0x328/0x630 [ 21.998915] ret_from_fork+0x10/0x20 [ 21.998998] [ 21.999034] Allocated by task 286: [ 21.999079] kasan_save_stack+0x3c/0x68 [ 21.999777] kasan_save_track+0x20/0x40 [ 22.000552] kasan_save_alloc_info+0x40/0x58 [ 22.000886] __kasan_kmalloc+0xd4/0xd8 [ 22.001275] __kmalloc_noprof+0x198/0x4c8 [ 22.001393] kunit_kmalloc_array+0x34/0x88 [ 22.001579] copy_user_test_oob+0xac/0xec8 [ 22.001694] kunit_try_run_case+0x170/0x3f0 [ 22.001931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.002167] kthread+0x328/0x630 [ 22.002290] ret_from_fork+0x10/0x20 [ 22.002757] [ 22.002869] The buggy address belongs to the object at fff00000c76c3a00 [ 22.002869] which belongs to the cache kmalloc-128 of size 128 [ 22.003008] The buggy address is located 0 bytes inside of [ 22.003008] allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78) [ 22.003446] [ 22.003504] The buggy address belongs to the physical page: [ 22.003570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3 [ 22.003662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.003725] page_type: f5(slab) [ 22.003774] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.003833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.004267] page dumped because: kasan: bad access detected [ 22.004901] [ 22.005017] Memory state around the buggy address: [ 22.005199] fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.005255] fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.005582] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.005727] ^ [ 22.006259] fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.006338] fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.006391] ==================================================================
[ 15.495130] ================================================================== [ 15.495484] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 15.495838] Write of size 121 at addr ffff88810258dd00 by task kunit_try_catch/302 [ 15.496244] [ 15.496357] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.496421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.496434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.496458] Call Trace: [ 15.496472] <TASK> [ 15.496492] dump_stack_lvl+0x73/0xb0 [ 15.496522] print_report+0xd1/0x650 [ 15.496547] ? __virt_addr_valid+0x1db/0x2d0 [ 15.496572] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.496595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.496618] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.496641] kasan_report+0x141/0x180 [ 15.496665] ? copy_user_test_oob+0x3fd/0x10f0 [ 15.496693] kasan_check_range+0x10c/0x1c0 [ 15.496718] __kasan_check_write+0x18/0x20 [ 15.496739] copy_user_test_oob+0x3fd/0x10f0 [ 15.496765] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.496788] ? finish_task_switch.isra.0+0x153/0x700 [ 15.496812] ? __switch_to+0x47/0xf50 [ 15.496839] ? __schedule+0x10cc/0x2b60 [ 15.496863] ? __pfx_read_tsc+0x10/0x10 [ 15.496885] ? ktime_get_ts64+0x86/0x230 [ 15.496910] kunit_try_run_case+0x1a5/0x480 [ 15.496935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.496957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.496982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.497006] ? __kthread_parkme+0x82/0x180 [ 15.497028] ? preempt_count_sub+0x50/0x80 [ 15.497051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.497075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.497099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.497122] kthread+0x337/0x6f0 [ 15.497143] ? trace_preempt_on+0x20/0xc0 [ 15.497168] ? __pfx_kthread+0x10/0x10 [ 15.497189] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.497210] ? calculate_sigpending+0x7b/0xa0 [ 15.497236] ? __pfx_kthread+0x10/0x10 [ 15.497258] ret_from_fork+0x116/0x1d0 [ 15.497277] ? __pfx_kthread+0x10/0x10 [ 15.497297] ret_from_fork_asm+0x1a/0x30 [ 15.497328] </TASK> [ 15.497341] [ 15.504168] Allocated by task 302: [ 15.504366] kasan_save_stack+0x45/0x70 [ 15.504593] kasan_save_track+0x18/0x40 [ 15.504787] kasan_save_alloc_info+0x3b/0x50 [ 15.505004] __kasan_kmalloc+0xb7/0xc0 [ 15.505195] __kmalloc_noprof+0x1c9/0x500 [ 15.505407] kunit_kmalloc_array+0x25/0x60 [ 15.505625] copy_user_test_oob+0xab/0x10f0 [ 15.505784] kunit_try_run_case+0x1a5/0x480 [ 15.505983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.506217] kthread+0x337/0x6f0 [ 15.506367] ret_from_fork+0x116/0x1d0 [ 15.506538] ret_from_fork_asm+0x1a/0x30 [ 15.506756] [ 15.506856] The buggy address belongs to the object at ffff88810258dd00 [ 15.506856] which belongs to the cache kmalloc-128 of size 128 [ 15.507321] The buggy address is located 0 bytes inside of [ 15.507321] allocated 120-byte region [ffff88810258dd00, ffff88810258dd78) [ 15.507782] [ 15.507857] The buggy address belongs to the physical page: [ 15.508032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d [ 15.508279] flags: 0x200000000000000(node=0|zone=2) [ 15.508543] page_type: f5(slab) [ 15.508716] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.509053] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.509330] page dumped because: kasan: bad access detected [ 15.509513] [ 15.509585] Memory state around the buggy address: [ 15.509740] ffff88810258dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.510095] ffff88810258dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510424] >ffff88810258dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.510750] ^ [ 15.511362] ffff88810258dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.511691] ffff88810258de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.511943] ================================================================== [ 15.512615] ================================================================== [ 15.512986] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 15.513225] Read of size 121 at addr ffff88810258dd00 by task kunit_try_catch/302 [ 15.513488] [ 15.513611] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.513655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.513668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.513692] Call Trace: [ 15.513708] <TASK> [ 15.513724] dump_stack_lvl+0x73/0xb0 [ 15.513753] print_report+0xd1/0x650 [ 15.513776] ? __virt_addr_valid+0x1db/0x2d0 [ 15.513799] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.513823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.513845] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.513868] kasan_report+0x141/0x180 [ 15.513892] ? copy_user_test_oob+0x4aa/0x10f0 [ 15.513920] kasan_check_range+0x10c/0x1c0 [ 15.513944] __kasan_check_read+0x15/0x20 [ 15.513964] copy_user_test_oob+0x4aa/0x10f0 [ 15.513990] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.514012] ? finish_task_switch.isra.0+0x153/0x700 [ 15.514035] ? __switch_to+0x47/0xf50 [ 15.514061] ? __schedule+0x10cc/0x2b60 [ 15.514084] ? __pfx_read_tsc+0x10/0x10 [ 15.514105] ? ktime_get_ts64+0x86/0x230 [ 15.514129] kunit_try_run_case+0x1a5/0x480 [ 15.514154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.514200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.514223] ? __kthread_parkme+0x82/0x180 [ 15.514245] ? preempt_count_sub+0x50/0x80 [ 15.514268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.514316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.514340] kthread+0x337/0x6f0 [ 15.514360] ? trace_preempt_on+0x20/0xc0 [ 15.514395] ? __pfx_kthread+0x10/0x10 [ 15.514416] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.514438] ? calculate_sigpending+0x7b/0xa0 [ 15.514463] ? __pfx_kthread+0x10/0x10 [ 15.514484] ret_from_fork+0x116/0x1d0 [ 15.514504] ? __pfx_kthread+0x10/0x10 [ 15.514525] ret_from_fork_asm+0x1a/0x30 [ 15.514555] </TASK> [ 15.514568] [ 15.521607] Allocated by task 302: [ 15.521932] kasan_save_stack+0x45/0x70 [ 15.522217] kasan_save_track+0x18/0x40 [ 15.522424] kasan_save_alloc_info+0x3b/0x50 [ 15.522709] __kasan_kmalloc+0xb7/0xc0 [ 15.522943] __kmalloc_noprof+0x1c9/0x500 [ 15.523099] kunit_kmalloc_array+0x25/0x60 [ 15.523246] copy_user_test_oob+0xab/0x10f0 [ 15.523402] kunit_try_run_case+0x1a5/0x480 [ 15.523626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.523880] kthread+0x337/0x6f0 [ 15.524058] ret_from_fork+0x116/0x1d0 [ 15.524246] ret_from_fork_asm+0x1a/0x30 [ 15.524461] [ 15.524558] The buggy address belongs to the object at ffff88810258dd00 [ 15.524558] which belongs to the cache kmalloc-128 of size 128 [ 15.525009] The buggy address is located 0 bytes inside of [ 15.525009] allocated 120-byte region [ffff88810258dd00, ffff88810258dd78) [ 15.525505] [ 15.525603] The buggy address belongs to the physical page: [ 15.525819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d [ 15.526062] flags: 0x200000000000000(node=0|zone=2) [ 15.526225] page_type: f5(slab) [ 15.526346] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.526655] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.526989] page dumped because: kasan: bad access detected [ 15.527227] [ 15.527297] Memory state around the buggy address: [ 15.527518] ffff88810258dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.527930] ffff88810258dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.528187] >ffff88810258dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.528411] ^ [ 15.528742] ffff88810258dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.529063] ffff88810258de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.529407] ================================================================== [ 15.555506] ================================================================== [ 15.556107] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 15.556527] Read of size 121 at addr ffff88810258dd00 by task kunit_try_catch/302 [ 15.557108] [ 15.557226] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.557430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.557448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.557471] Call Trace: [ 15.557488] <TASK> [ 15.557506] dump_stack_lvl+0x73/0xb0 [ 15.557536] print_report+0xd1/0x650 [ 15.557560] ? __virt_addr_valid+0x1db/0x2d0 [ 15.557593] ? copy_user_test_oob+0x604/0x10f0 [ 15.557616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.557639] ? copy_user_test_oob+0x604/0x10f0 [ 15.557662] kasan_report+0x141/0x180 [ 15.557684] ? copy_user_test_oob+0x604/0x10f0 [ 15.557713] kasan_check_range+0x10c/0x1c0 [ 15.557738] __kasan_check_read+0x15/0x20 [ 15.557758] copy_user_test_oob+0x604/0x10f0 [ 15.557783] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.557807] ? finish_task_switch.isra.0+0x153/0x700 [ 15.557831] ? __switch_to+0x47/0xf50 [ 15.557858] ? __schedule+0x10cc/0x2b60 [ 15.557882] ? __pfx_read_tsc+0x10/0x10 [ 15.557903] ? ktime_get_ts64+0x86/0x230 [ 15.557929] kunit_try_run_case+0x1a5/0x480 [ 15.557954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.557977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.558001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.558024] ? __kthread_parkme+0x82/0x180 [ 15.558045] ? preempt_count_sub+0x50/0x80 [ 15.558069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.558093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.558116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.558140] kthread+0x337/0x6f0 [ 15.558160] ? trace_preempt_on+0x20/0xc0 [ 15.558186] ? __pfx_kthread+0x10/0x10 [ 15.558207] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.558228] ? calculate_sigpending+0x7b/0xa0 [ 15.558253] ? __pfx_kthread+0x10/0x10 [ 15.558275] ret_from_fork+0x116/0x1d0 [ 15.558294] ? __pfx_kthread+0x10/0x10 [ 15.558315] ret_from_fork_asm+0x1a/0x30 [ 15.558344] </TASK> [ 15.558357] [ 15.568355] Allocated by task 302: [ 15.568557] kasan_save_stack+0x45/0x70 [ 15.569091] kasan_save_track+0x18/0x40 [ 15.569395] kasan_save_alloc_info+0x3b/0x50 [ 15.569626] __kasan_kmalloc+0xb7/0xc0 [ 15.569909] __kmalloc_noprof+0x1c9/0x500 [ 15.570187] kunit_kmalloc_array+0x25/0x60 [ 15.570513] copy_user_test_oob+0xab/0x10f0 [ 15.570803] kunit_try_run_case+0x1a5/0x480 [ 15.571103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.571355] kthread+0x337/0x6f0 [ 15.571544] ret_from_fork+0x116/0x1d0 [ 15.571927] ret_from_fork_asm+0x1a/0x30 [ 15.572206] [ 15.572481] The buggy address belongs to the object at ffff88810258dd00 [ 15.572481] which belongs to the cache kmalloc-128 of size 128 [ 15.573094] The buggy address is located 0 bytes inside of [ 15.573094] allocated 120-byte region [ffff88810258dd00, ffff88810258dd78) [ 15.573672] [ 15.573779] The buggy address belongs to the physical page: [ 15.574024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d [ 15.574342] flags: 0x200000000000000(node=0|zone=2) [ 15.574839] page_type: f5(slab) [ 15.575144] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.575492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.576045] page dumped because: kasan: bad access detected [ 15.576403] [ 15.576700] Memory state around the buggy address: [ 15.576934] ffff88810258dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.577316] ffff88810258dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.577720] >ffff88810258dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.578012] ^ [ 15.578317] ffff88810258dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.578630] ffff88810258de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.579190] ================================================================== [ 15.530249] ================================================================== [ 15.531191] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 15.532322] Write of size 121 at addr ffff88810258dd00 by task kunit_try_catch/302 [ 15.532762] [ 15.532881] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.532926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.533117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.533141] Call Trace: [ 15.533157] <TASK> [ 15.533288] dump_stack_lvl+0x73/0xb0 [ 15.533325] print_report+0xd1/0x650 [ 15.533351] ? __virt_addr_valid+0x1db/0x2d0 [ 15.533387] ? copy_user_test_oob+0x557/0x10f0 [ 15.533410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.533433] ? copy_user_test_oob+0x557/0x10f0 [ 15.533456] kasan_report+0x141/0x180 [ 15.533478] ? copy_user_test_oob+0x557/0x10f0 [ 15.533508] kasan_check_range+0x10c/0x1c0 [ 15.533533] __kasan_check_write+0x18/0x20 [ 15.533553] copy_user_test_oob+0x557/0x10f0 [ 15.533591] ? __pfx_copy_user_test_oob+0x10/0x10 [ 15.533614] ? finish_task_switch.isra.0+0x153/0x700 [ 15.533636] ? __switch_to+0x47/0xf50 [ 15.533662] ? __schedule+0x10cc/0x2b60 [ 15.533685] ? __pfx_read_tsc+0x10/0x10 [ 15.533706] ? ktime_get_ts64+0x86/0x230 [ 15.533730] kunit_try_run_case+0x1a5/0x480 [ 15.533755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.533778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.533802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.533825] ? __kthread_parkme+0x82/0x180 [ 15.533847] ? preempt_count_sub+0x50/0x80 [ 15.533872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.533896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.533919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.533943] kthread+0x337/0x6f0 [ 15.533963] ? trace_preempt_on+0x20/0xc0 [ 15.533986] ? __pfx_kthread+0x10/0x10 [ 15.534008] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.534031] ? calculate_sigpending+0x7b/0xa0 [ 15.534056] ? __pfx_kthread+0x10/0x10 [ 15.534078] ret_from_fork+0x116/0x1d0 [ 15.534098] ? __pfx_kthread+0x10/0x10 [ 15.534119] ret_from_fork_asm+0x1a/0x30 [ 15.534150] </TASK> [ 15.534162] [ 15.544348] Allocated by task 302: [ 15.544745] kasan_save_stack+0x45/0x70 [ 15.545034] kasan_save_track+0x18/0x40 [ 15.545181] kasan_save_alloc_info+0x3b/0x50 [ 15.545402] __kasan_kmalloc+0xb7/0xc0 [ 15.545803] __kmalloc_noprof+0x1c9/0x500 [ 15.546004] kunit_kmalloc_array+0x25/0x60 [ 15.546163] copy_user_test_oob+0xab/0x10f0 [ 15.546513] kunit_try_run_case+0x1a5/0x480 [ 15.546865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.547200] kthread+0x337/0x6f0 [ 15.547459] ret_from_fork+0x116/0x1d0 [ 15.547748] ret_from_fork_asm+0x1a/0x30 [ 15.548045] [ 15.548125] The buggy address belongs to the object at ffff88810258dd00 [ 15.548125] which belongs to the cache kmalloc-128 of size 128 [ 15.548959] The buggy address is located 0 bytes inside of [ 15.548959] allocated 120-byte region [ffff88810258dd00, ffff88810258dd78) [ 15.549428] [ 15.549532] The buggy address belongs to the physical page: [ 15.549846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d [ 15.550183] flags: 0x200000000000000(node=0|zone=2) [ 15.550414] page_type: f5(slab) [ 15.550573] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 15.550885] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.551193] page dumped because: kasan: bad access detected [ 15.551956] [ 15.552051] Memory state around the buggy address: [ 15.552207] ffff88810258dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.552765] ffff88810258dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553152] >ffff88810258dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.553561] ^ [ 15.553954] ffff88810258dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.554369] ffff88810258de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.554806] ==================================================================